A Comparison of Two Interval-valued Probabilistic Reasoning Methods

Size: px
Start display at page:

Download "A Comparison of Two Interval-valued Probabilistic Reasoning Methods"

Transcription

1 A Comparison of Two Interval-valued Probabilistic Reasoning Methods Y.Y. Yao Department of Mathematical Sciences, Lakehead University Thunder Bay, Ontario, Canada P7B 5E1 Abstract Two complementary interval-valued probabilistic reasoning approaches, the incidence calculus proposed by Bundy and the cautious probabilistic reasoning method suggested by Quinlan, are analyzed and compared in this study. The correspondences are drawn between the sets of inference axioms employed by each model. In incidence calculus, the set of inference axioms produces the tightest probability bounds. In contrast, Quinlan s axioms do not necessarily generate the tightest probability bounds. Based on the results of such an comparison, Quinlan s axioms may be refined to produce tighter probability bounds. 1 Introduction The well established probability theory has been a dominant tool for uncertainty management. There are two fundamental issues involved, the representation of uncertainty using probability functions and inference with such information. Traditionally, a single probability function is used in which the uncertainty of a proposition is expressed by a single number. There are a number of practical problems associated with such an approach [12]. For example, it may be unrealistic to expect an expert

2 to provide precise and reliable probability values. The maintenance of consistency using a single probability function may also be difficult. To resolve these problems, various proposals have been suggested based on the notion of interval-valued probability [1, 5, 7, 11]. These proposals have resulted in many non-standard tools for uncertainty management, such as the incidence calculus [2, 3], the certainty factor model of MYCIN [14], Quinlan s method of cautious probabilistic reasoning [12], the probabilistic logic proposed by Nilsson [10], and the theory of belief and plausibility functions [8, 13, 15]. In interval-valued approaches, the probability of a proposition is not represented by a single number but by an interval. Instead of providing the exact probability value, one provides a range within which lies the true probability value of the proposition. Uncertainty of a proposition is characterized by a family of probability functions bounded by such probability intervals. Inference using interval-valued probability may be carried out in different ways. For example, one may convert probability intervals into a single probability function by using the maximum entropy principle [6]. Alternatively, one may consider probability intervals as constraints on the set of probability functions representing the uncertainty of the propositions. A probabilistic inference process is formulated as a constraint propagation [11]. An advantage of the latter approach is that no ad hoc assumption is introduced. In this paper, we present a critical and comparative study of two complementary interval-valued probabilistic reasoning approaches. One is a non-numeric approach called incidence calculus proposed by Bundy [2, 3], and the other is a numeric approach introduced by Quinlan [12]. Our analysis focuses on the inference axioms employed by these two models. We will examine the similarities between these models and the limitations of each model. The results of such a comparative study clearly indicate that on the one hand, these models are closely related to each other, although each uses entirely different notations; on the other hand, each model captures

3 different aspects of interval-valued probabilistic reasoning. Probabilistic reasoning using incidence calculus corresponds to uncertain reasoning with belief and plausibility functions which may be interpreted as a special type of interval-valued probabilities [4, 16]. In this case, one can derive the tightest probability bounds using the inference axioms of incidence calculus. In contrast, Quinlan s methods can be applied to perform more general type of interval-valued probabilistic reasoning. However, the inference axioms used by Quinlan do not necessarily produce the tightest probability bounds. By refining these axioms, it is possible to infer tighter probability bounds. 2 Non-numeric probabilistic reasoning Let Φ be a finite and non-empty set of propositions of interest. A propositional language formed from Φ is denoted by L(Φ). It is the smallest set containing the truth values (true and false), and being closed under negation ( ), conjunction ( ), disjunction ( ), and implication ( ). Let W be a non-empty set of possible worlds. It represents the states or situations of the system being modeled. Each possible world can be considered as a partial interpretation of some logical formulas in the propositional language L(Φ). With respect to a possible world w W, a proposition φ L(Φ) is either true or false. In incidence calculus, instead of using a numeric value, a subset i(φ) W is assigned to a given proposition φ L(Φ) to indicate that φ is true for all w i(φ), and φ is false for all w i(φ). The set i(φ) is referred to as the incidence set of φ. Bundy [2] suggested that an incidence mapping i : L(Φ) 2 W should satisfy the following axioms: (IC1) (IC2) i( φ) = W i(φ), i(φ ψ) = i(φ) i(ψ).

4 These axioms directly follow from the semantics of propositional logic. Axiom (IC1) says that for any situation w W, if φ is true, then φ is false. Axiom (IC2) states that for any situation w W, if both φ and ψ are true, then φ ψ is true. A mapping i : L(Φ) 2 W satisfying axioms (IC1) and (IC2) is also called an incidence structure [16]. An incidence structure has the following additional properties: (IC3) i(true) = W, (IC4) i(f alse) =, (IC5) i(φ ψ) = i(φ) i(ψ). In fact, an incidence structure can be equivalently defined by another set of axioms consisting of (IC1) and (IC5). It should be noted that axioms (IC1), (IC2) and (IC5) suggest that, with an incidence structure, logic connectives, and are interpreted in terms of set-theoretic operations on the possible worlds. Moreover, an incidence structure is truth-functional. In practice, it may be difficult to specify precisely the incidence set of a proposition. One may be able to provide only lower and upper bounds of the incidence sets of certain propositions. In the absence of any information about a proposition, one may use the trivial lower bound and the trivial upper bound W. The assignment of incidence bounds can be formally described by two mappings i : L(Φ) 2 W and i : L(Φ) 2 W. They specify an interval set [i (φ), i (φ)] within which lies the true incidence set of the proposition [17]. A set of lower and upper bounds is said to be consistent if there exists an incidence structure i such that for all φ L(Φ), i (φ) i(φ) i (φ). (1) On the other hand, if an incidence structure i satisfies equation (1), we say that i is bounded by the pair (i, i ) [16]. A consistent set of lower and upper bounds (i, i )

5 can be interpreted as constraints on incidence structures. In fact, they define the following maximal family of incidence structures: I = {i i (φ) i(φ) i (φ) for every φ L(Φ)}. (2) For the set I, a pair of bounds i 0 : L(Φ) 2 W and i 0 : L(Φ) 2 W is called the tightest bounds if every incidence structure i I is bounded by (i 0, i 0 ) and there does not exist another pair of bounds inside (i 0, i 0 ) having this property. If a pair of lower and upper bounds is consistent, the tightest bounds are unique. In many situations, incidence bounds of some propositions are not known and are represented by the trivial bounds [, W]. The initial pair (i, i ) may not necessarily be the tightest bounds. Even worse, the initial pair may be inconsistent. The main tasks of reasoning with incidence calculus are to infer information about propositions whose incidence bounds are not given, to sharpen the initial bounds, and to resolve inconsistency. Given the set of incidence structures I derived from the initial bounds i and i, the tightest bounds are given by: i 0 (φ) = i(φ), i I i 0 (φ) = i(φ). (3) i I However, they do not directly offer an efficient algorithm for the construction of the tightest bounds. Bundy [2, 3] introduced a set of inference axioms for resolving this problem. The following list is a modified version of these axioms: (I1) (I2) i (φ) i (φ) (W i ( φ)); i (φ) i (φ) (W i ( φ));

6 (I3) (I4) (I5) (I6) i (φ ψ) i (φ ψ) (i (φ) i (ψ)); i (φ ψ) i (φ ψ) i (φ) i (ψ); i (φ) i (φ) i (φ ψ); i (φ) i (φ) (i (φ ψ) (W i (ψ))). For simplicity, we only consider the primitive connectives (negation) and (conjunction). A proposition expressed by the non-primitive connectives such as (disjunction), (implication), (equivalence), and the logical constants, true and false, can be reexpressed by a normal form containing only and. The symbol is an assignment operator which assigns a new value to a lower or an upper bound based on its old value. It is interesting to note that inference rules (I1)-(I6) may also be obtained from the set-theoretic operations of the interval-set model [17]. Obviously, rules (I1)-(I6) will increase lower bounds and decrease upper bounds. These Inference rules are applied repeatedly until the values of i and i are unchanged. Wong, Wang and Yao [16] have shown that these axioms indeed produce the tightest bounds. Moreover, the tightest bounds satisfy the following important properties: i (φ ψ) = i (φ) i (ψ), i (φ ψ) = i (φ) i (ψ). (4) That is, the tightest bounds form an interval structure [16]. Probabilistic reasoning with incidence calculus is carried out using a probability function on W. Let P W denote a probability function defined on W. The probability of a proposition φ is defined using its incidence set by: P(φ) = P W (i(φ)). (5) If only lower and upper bounds of the incidence sets are given and refined used using inference rules (I1)-(I6), the corresponding lower and upper probabilities of a

7 proposition are defined by: P (φ) = P W (i (φ)), P (φ) = P W (i (φ)). (6) Using properties given in equation (4), Wong, Wang and Yao [16] have shown that the lower and upper probabilities define a pair of belief and plausibility functions [13]. Thus, the interval-valued probabilistic reasoning using incidence calculus is similar to evidential reasoning using belief functions [4, 16]. However, it is also important to point out that the interval-valued probabilistic interpretation of belief and plausibility functions is only one of the several views, and such an interpretation may not be accepted by some authors [13, 15]. 3 Numeric probabilistic reasoning Interval-based probabilistic reasoning methods have also been proposed based on a direct assignment of probability bounds and the manipulation of such bounds [1, 11]. In the light of the incidence calculus, this section examines a modified and simpler version of the approach proposed by Quinlan [12]. Our analysis suggests that the inference axioms can be refined to produce tighter probability bounds. Suppose a pair of lower and upper probabilities P (φ) and P (φ) is associated with a proposition φ to indicate the bounds of its true probability, i.e., P(φ) [P (φ), P (φ)]. We refer to [P (φ), P (φ)] as interval-valued probability of φ and P(φ) as point-valued probability of φ. If one is totally ignorant of the probability of a proposition, the trivial bounds [0, 1] can be used. The lower and upper bounds can be described by two mappings P : L(Φ) [0, 1] and P : L(Φ) [0, 1]. A pair of probability bounds (P, P ) is said to be consistent if there exists a probability

8 function P such that for all φ L(Φ), P (φ) P(φ) P (φ). (7) A consistent pair of lower and upper bounds (P, P ) can be interpreted as constraints on probability functions. They characterize the maximal family of probability functions: P = {P P (φ) P(φ) P (φ) for every φ L(Φ)}. (8) This set can be equivalently defined by the pair of tightest bounds: P 0 (φ) = inf P(φ), P P P 0 (φ) = sup P(φ). (9) P P The main task of probabilistic inference is to propagate, under the constraint set P, the probability bounds of certain propositions to other propositions whose probabilities are not available. Quinlan analyzed several types of relationships between propositions and proposed the corresponding inference axioms [12]. A subset of inference axioms related to the primitive connectives and is summarized below: (P1) (P2) P (φ) max{p (φ), 1 P ( φ)}; P (φ) min{p (φ), 1 P ( φ)}; (P3) P (φ ψ) max{p (φ ψ), P (φ) + P (ψ) 1}; (P4) (P5) (P6) P (φ ψ) min{p (φ ψ), P (φ), P (ψ)}; P (φ) max{p (φ), P (φ ψ)}; P (φ) min{p (φ), P (φ ψ) + (1 P (ψ))}.

9 They can be easily extended to more than two propositions as in Quinlan s original rules. Inference rules similar to (P1)-(P6) have been used in other interval-valued probabilistic reasoning approaches [1, 8]. The application of inference rules (P1)-(P6) will increase lower bounds and decrease upper bounds. However, they do not necessarily produce the tightest bounds. This may stem from the fact that they are derived from the following inequality: P(φ) + P(ψ) 1 P(φ ψ) min{p(φ), P(ψ)}, (10) which is an expression of bounds for P(φ ψ) based on point-valued probabilities of φ and ψ. In the case where interval-valued probabilities of φ and ψ are given, these rules can be refined to produce tighter bounds. For any two propositions φ and ψ, the following equality holds: P(φ ψ) = P(φ) + P(ψ) P(φ ψ). (11) If the interval-valued probabilities are given instead of point-valued probabilities, one can express the right hand side of equation (11) in an interval form: [P (φ), P (φ)] + [P (ψ), P (ψ)] [P (φ ψ), P (φ ψ)]. (12) The symbols + and in the above equation are interpreted as interval arithmetic operations introduced by Moore [9]: [a 1, a 2 ] + [b 1, b 2 ] = [a 1 + b 1, a 2 + b 2 ], [a 1, a 2 ] [b 1, b 2 ] = [a 1 b 2, a 2 b 1 ], (13) where [a 1, a 2 ] and [b 1, b 2 ] are two interval numbers. Therefore, the value of equation (12) can be simplified into: [P (φ) + P (ψ) P (φ ψ), P (φ) + P (ψ) P (φ ψ)], (14)

10 which gives the bounds of the probability P(φ ψ). Incorporating this information into the inference rules (P3) and (P4), we obtain the following refined rules: (P3 ) P (φ ψ) max{p (φ ψ), P (φ) + P (ψ) P (φ ψ)}; (P4 ) P (φ ψ) min{p (φ ψ), P (φ), P (ψ), P (φ) + P (ψ) P (φ ψ)}. In general, P (φ ψ) 1, hence: P (φ) + P (ψ) 1 P (φ) + P (ψ) P (φ ψ). (15) This implies that inference rule (P3 ) may produce a larger lower bound compared with the original rule (P3). By definition, rule (P4 ) may produce a smaller upper bound. Using the same technique, we obtain the refined rules corresponding to (P5) and (P6): (P5 ) P (φ) max{p (φ), P (φ ψ), P (φ ψ) + P (φ ψ) P (ψ)}; (P6 ) P (φ) min{p (φ), P (φ ψ) + P (φ ψ) P (ψ)}. Clearly, (P5 ) may produce a larger lower bound compared with rule (P5). From P (φ ψ) 1 for any φ, ψ L(Φ), one can conclude that: P (φ ψ) + 1 P (ψ) P (φ ψ) + P (φ ψ) P (ψ). (16) This implies that (P6 ) may produce a smaller upper bound than rule (P6). In summary, the refined rules (P3 )-(P6 ) may produce tighter probability bounds. These rules can also be extended to more than two propositions. However, it will be much difficult to compute. In other words, the gain in accuracy is obtained from a higher computational cost.

11 4 Comparison of the two reasoning methods The incidence calculus of Bundy and cautious probabilistic reasoning method of Quinlan represent two complementary approaches of interval-valued probabilistic reasoning. One is a non-numeric method using the notion of incidence sets to assign probability bounds indirectly, while the other is a numeric approach dealing with the direct assignment of probability bounds. Each model captures certain important aspects of probabilistic reasoning. The discussion of the last two sections clearly shows that the inference paradigms by Bundy and Quinlan are significantly similar. Both approaches are based on the same assumption that one may not use a single value to represent the uncertainty about a proposition, but can use an interval to specify certain range. In incidence calculus, incidence bounds are interpreted as constraints defining a family of incidence structures. In a similar way, probability bounds are regarded to as constraints characterizing a family of probability functions in Quinlan s model. It is assumed that incidence or probability bounds are provided only for a subset of propositions in L(Φ). It is also assumed that experts underestimate lower bounds and overestimate upper bounds. Consequently, two sets of inference rules (I1)-(I6) and (P1)-(P6) are used to refine the initial expert assignments, and to infer information about other propositions. More specifically, the inference rules increase lower bounds and decrease upper bounds. The inferred new bounds are consistent with the initial bounds. The process of such inference can be interpreted as the propagation of uncertainty under the constraints given by the initial bounds. That is, the inference patterns in both models conform to a more general paradigm known as constraint propagation [11]. Wong, Wang and Yao [16] have shown the correspondences between incidence structures and probability functions, and between interval structures (i.e., the tightest incidence bounds) and belief and plausibility functions. By applying a similar

12 argument, one can show that there is a close relationship between inference rules (I1)-(I6) and (P1)-(P6). Let P W be a probability function on W. It may be applied to inference rule (I1)-(I6) in the same way as defined by equation (6). For example, if P W is appled to the right hand side of rule (I3), from the properties of probability function, we have: P W (i (φ ψ) (i (φ) i (ψ))) max{p W (i (φ ψ)), P W (i (φ) i (ψ))} = max{p W (i (φ ψ)), P W (i (φ)) + P W (i (ψ)) P W (i (φ) i (ψ))} max{p W (i (φ ψ)), P W (i (φ)) + P W (i (ψ)) 1}; = max{p (φ ψ), P (φ) + P (ψ) 1}. (17) This is exactly the right hand side of inference rule (P3). Thus, rule (I3) may be considered as the non-numeric counterpart of rule (P3). However, it should be emphasized that such a correspondence is established based on a very restrictive assumption P W (i (φ) i (ψ)) = 1. This is not surprising as similar kind of assumption is indeed used in the derivation of inference rules (P1)-(P6). The same argument can be used to show the correspondences between other inference rules. One may therefore say that the inference rules adopted by both approaches are consistent and compatible with each other. There are differences between two approaches. An incidence structure is truthfunctional with respect to logical connectives, and, i.e., the incidence set of a composite expression can be evaluated solely from the incidence sets of its components. The use of truth-functional inference rules (I1)-(I6) seems to be appropriate. In fact, because of the truth-functionality of incidence structure, inference rules (I1)- (I6) are not only correct and but also deduce the tightest bounds. On the other hand, a probability function is not truth-functional. The adoption of truth-functional inference rules (P1)-(P6) for probability bounds may not be suitable. It is not surprising

13 that they do not infer the tightest bounds. Nevertheless, inference rules (P1)-(P6) are useful by virtue of its low computational cost. The refined inference rules (P3 )-(P6 ), which may produce tighter bounds, are not truth-functional. They seem more appropriate for interval-valued probabilistic reasoning. The main problem with inference rules (P3 )-(P6 ) is their computational complexity. The inference rules can easily become complicated with more than two propositions. It is also not clear if they will produce the tightest bounds. Given a set of possible worlds W and a probability function P W on W, an incidence structure i determines a unique probability function P on L(Φ). Conversely, given a probability function, it may be converted into different incidence structures [2]. That is, incidence sets of propositions incorporate more dependence information about the individual propositions than probabilities. Probabilistic reasoning with incidence calculus is therefore not equivalent to direct probabilistic reasoning. In fact, as mentioned in Section 2, interval-valued probabilistic reasoning using incidence calculus leads to evidential reasoning with belief and plausibility functions. In contrast, direct assignment of probability is less restrictive, which only leads to lower and upper probabilities. This makes the task of finding the tightest bounds much more difficult. 5 Conclusion In this paper, we have analyzed and compared two complementary interval-valued probabilistic reasoning approaches, the incidence calculus proposed by Bundy and the cautious probabilistic reasoning method introduced by Quinlan. Our analysis has shown that each of these approaches captures different aspects of interval-valued probabilistic reasoning. The formulation of incidence calculus is limited to a special class of interval-valued probabilities known as belief and plausibility functions. Quinlan s method, although computational efficient, fails to obtain the tightest prob-

14 ability bounds based on the available information. Using interval arithmetic, we have refined these inference rules. The new set of rules is theoretical more appropriate for reasoning about interval-valued probabilities, and can in fact produce tighter bounds. However, it may be difficult to use in practice because of its computational complexity. In the studies of Bundy and Quinlan, the notions of conditional information and inconsistency have been considered. It may be useful to extend the present study along this line and to establish a unified framework for the study of interval-valued probabilistic reasoning. Acknowledgement The author is grateful for financial support from the NSERC Canada. References [1] Bonissone, P. Plausible reasoning. Encyclopedia of Artificial Intelligence, , [2] Bundy, A. Incidence calculus: a mechanism for probabilistic reasoning. Journal of Automated Reasoning, 1, , [3] Bundy, A. Correctness criteria of some algorithms for uncertain reasoning using incidence calculus. Journal of Automated Reasoning, 2, , [4] Correa da Silva, F. and Bundy A. On some equivalence relations between incidence calculus and Dempster-Shafer theory of evidence. Proceedings of 6th International Workshop on Uncertainty in Artificial Intelligence, , 1990.

15 [5] Dempster, A.P. Upper and lower probabilities induced by a multivalued mapping. Annals of Mathematical Statistics, 38, [6] Jaynes, E.T. Where do we stand on maximum entropy? In R.D. Levine and M. Tribus (Eds.), The Maximum Entropy Formalism, The MIT Press, Cambridge, Massachusetts, [7] Kyburg, Jr. H.E. The reference class. Philosophy of Science, 50, , [8] Lowrance, J.D. and Garvey, T.D. Evidential reasoning: a developing concept. Proceedings of the International Conference on Cybernetics and Society, 6-9, [9] Moore, R.E. Interval Analysis, Prentice-Hall, Englewood Cliffs, New Jersey, [10] Nilsson, N.J. Probabilistic logic. Artificial Intelligence, 28, 71-87, [11] Pearl, J. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference, Morgan Kaufmann, San Mateo, California, [12] Quinlan, J.R. Inferno: a cautious approach to uncertain inference. The Computer Journal, 26, , [13] Shafer, G. Perspectives on the theory and practice of belief functions. International Journal of Approximate Reasoning, 4, , [14] Shortliffe, E.H. Computer-Based Medical Consultations: MYCIN, North- Holland, New York, 1976.

16 [15] Smets, P. Belief functions (with discussions). In P. Smets, A. Mamdani, D. Dubois, H. Prade (Eds.), Non-standard Logics for Automated Reasoning, Academic Press, New York, , [16] Wong, S.K.M., Wang, L.S., and Yao, Y.Y. Interval structures: a framework for representing uncertain information. Proceedings of Eighth Conference on Uncertainty in Artificial Intelligence, , [17] Yao, Y.Y. Interval-set algebra for qualitative knowledge representation. Proceedings of the Fifth International Conference on Computing and Information, , 1993.

COMPUTATIONAL METHODS FOR A MATHEMATICAL THEORY OF EVIDENCE

COMPUTATIONAL METHODS FOR A MATHEMATICAL THEORY OF EVIDENCE COMPUTATIONAL METHODS FOR A MATHEMATICAL THEORY OF EVIDENCE Jeffrey A. Barnett USC/lnformation Sciences Institute ABSTRACT: Many knowledge-based expert systems employ numerical schemes to represent evidence,

More information

Incorporating Evidence in Bayesian networks with the Select Operator

Incorporating Evidence in Bayesian networks with the Select Operator Incorporating Evidence in Bayesian networks with the Select Operator C.J. Butz and F. Fang Department of Computer Science, University of Regina Regina, Saskatchewan, Canada SAS 0A2 {butz, fang11fa}@cs.uregina.ca

More information

CHAPTER 7 GENERAL PROOF SYSTEMS

CHAPTER 7 GENERAL PROOF SYSTEMS CHAPTER 7 GENERAL PROOF SYSTEMS 1 Introduction Proof systems are built to prove statements. They can be thought as an inference machine with special statements, called provable statements, or sometimes

More information

Removing Partial Inconsistency in Valuation- Based Systems*

Removing Partial Inconsistency in Valuation- Based Systems* Removing Partial Inconsistency in Valuation- Based Systems* Luis M. de Campos and Serafín Moral Departamento de Ciencias de la Computación e I.A., Universidad de Granada, 18071 Granada, Spain This paper

More information

Handout #1: Mathematical Reasoning

Handout #1: Mathematical Reasoning Math 101 Rumbos Spring 2010 1 Handout #1: Mathematical Reasoning 1 Propositional Logic A proposition is a mathematical statement that it is either true or false; that is, a statement whose certainty or

More information

WHAT ARE MATHEMATICAL PROOFS AND WHY THEY ARE IMPORTANT?

WHAT ARE MATHEMATICAL PROOFS AND WHY THEY ARE IMPORTANT? WHAT ARE MATHEMATICAL PROOFS AND WHY THEY ARE IMPORTANT? introduction Many students seem to have trouble with the notion of a mathematical proof. People that come to a course like Math 216, who certainly

More information

3. Mathematical Induction

3. Mathematical Induction 3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)

More information

1 Error in Euler s Method

1 Error in Euler s Method 1 Error in Euler s Method Experience with Euler s 1 method raises some interesting questions about numerical approximations for the solutions of differential equations. 1. What determines the amount of

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES Contents 1. Random variables and measurable functions 2. Cumulative distribution functions 3. Discrete

More information

Degrees of Truth: the formal logic of classical and quantum probabilities as well as fuzzy sets.

Degrees of Truth: the formal logic of classical and quantum probabilities as well as fuzzy sets. Degrees of Truth: the formal logic of classical and quantum probabilities as well as fuzzy sets. Logic is the study of reasoning. A language of propositions is fundamental to this study as well as true

More information

So let us begin our quest to find the holy grail of real analysis.

So let us begin our quest to find the holy grail of real analysis. 1 Section 5.2 The Complete Ordered Field: Purpose of Section We present an axiomatic description of the real numbers as a complete ordered field. The axioms which describe the arithmetic of the real numbers

More information

UPDATES OF LOGIC PROGRAMS

UPDATES OF LOGIC PROGRAMS Computing and Informatics, Vol. 20, 2001,????, V 2006-Nov-6 UPDATES OF LOGIC PROGRAMS Ján Šefránek Department of Applied Informatics, Faculty of Mathematics, Physics and Informatics, Comenius University,

More information

CHAPTER 2. Logic. 1. Logic Definitions. Notation: Variables are used to represent propositions. The most common variables used are p, q, and r.

CHAPTER 2. Logic. 1. Logic Definitions. Notation: Variables are used to represent propositions. The most common variables used are p, q, and r. CHAPTER 2 Logic 1. Logic Definitions 1.1. Propositions. Definition 1.1.1. A proposition is a declarative sentence that is either true (denoted either T or 1) or false (denoted either F or 0). Notation:

More information

CHAPTER 3. Methods of Proofs. 1. Logical Arguments and Formal Proofs

CHAPTER 3. Methods of Proofs. 1. Logical Arguments and Formal Proofs CHAPTER 3 Methods of Proofs 1. Logical Arguments and Formal Proofs 1.1. Basic Terminology. An axiom is a statement that is given to be true. A rule of inference is a logical rule that is used to deduce

More information

Likewise, we have contradictions: formulas that can only be false, e.g. (p p).

Likewise, we have contradictions: formulas that can only be false, e.g. (p p). CHAPTER 4. STATEMENT LOGIC 59 The rightmost column of this truth table contains instances of T and instances of F. Notice that there are no degrees of contingency. If both values are possible, the formula

More information

Creating, Solving, and Graphing Systems of Linear Equations and Linear Inequalities

Creating, Solving, and Graphing Systems of Linear Equations and Linear Inequalities Algebra 1, Quarter 2, Unit 2.1 Creating, Solving, and Graphing Systems of Linear Equations and Linear Inequalities Overview Number of instructional days: 15 (1 day = 45 60 minutes) Content to be learned

More information

8 Divisibility and prime numbers

8 Divisibility and prime numbers 8 Divisibility and prime numbers 8.1 Divisibility In this short section we extend the concept of a multiple from the natural numbers to the integers. We also summarize several other terms that express

More information

Lecture Note 1 Set and Probability Theory. MIT 14.30 Spring 2006 Herman Bennett

Lecture Note 1 Set and Probability Theory. MIT 14.30 Spring 2006 Herman Bennett Lecture Note 1 Set and Probability Theory MIT 14.30 Spring 2006 Herman Bennett 1 Set Theory 1.1 Definitions and Theorems 1. Experiment: any action or process whose outcome is subject to uncertainty. 2.

More information

Generating models of a matched formula with a polynomial delay

Generating models of a matched formula with a polynomial delay Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic

More information

How To Understand The Theory Of Computer Science

How To Understand The Theory Of Computer Science Theory of Computation Lecture Notes Abhijat Vichare August 2005 Contents 1 Introduction 2 What is Computation? 3 The λ Calculus 3.1 Conversions: 3.2 The calculus in use 3.3 Few Important Theorems 3.4 Worked

More information

Example 1. Consider the following two portfolios: 2. Buy one c(s(t), 20, τ, r) and sell one c(s(t), 10, τ, r).

Example 1. Consider the following two portfolios: 2. Buy one c(s(t), 20, τ, r) and sell one c(s(t), 10, τ, r). Chapter 4 Put-Call Parity 1 Bull and Bear Financial analysts use words such as bull and bear to describe the trend in stock markets. Generally speaking, a bull market is characterized by rising prices.

More information

Undergraduate Notes in Mathematics. Arkansas Tech University Department of Mathematics

Undergraduate Notes in Mathematics. Arkansas Tech University Department of Mathematics Undergraduate Notes in Mathematics Arkansas Tech University Department of Mathematics An Introductory Single Variable Real Analysis: A Learning Approach through Problem Solving Marcel B. Finan c All Rights

More information

What is Linear Programming?

What is Linear Programming? Chapter 1 What is Linear Programming? An optimization problem usually has three essential ingredients: a variable vector x consisting of a set of unknowns to be determined, an objective function of x to

More information

Risk Analysis of Development Programs

Risk Analysis of Development Programs P. P. PANDOLFINI A Risk Analysis of Development Programs Peter P. Pandolfini set-theory methodology for risk analysis was first proposed by Benjamin Blanchard. The methodology is explained here in terms

More information

Review. Bayesianism and Reliability. Today s Class

Review. Bayesianism and Reliability. Today s Class Review Bayesianism and Reliability Models and Simulations in Philosophy April 14th, 2014 Last Class: Difference between individual and social epistemology Why simulations are particularly useful for social

More information

The Graphical Method: An Example

The Graphical Method: An Example The Graphical Method: An Example Consider the following linear program: Maximize 4x 1 +3x 2 Subject to: 2x 1 +3x 2 6 (1) 3x 1 +2x 2 3 (2) 2x 2 5 (3) 2x 1 +x 2 4 (4) x 1, x 2 0, where, for ease of reference,

More information

Regular Languages and Finite Automata

Regular Languages and Finite Automata Regular Languages and Finite Automata 1 Introduction Hing Leung Department of Computer Science New Mexico State University Sep 16, 2010 In 1943, McCulloch and Pitts [4] published a pioneering work on a

More information

Artificial Intelligence in Knowledge-based Technologies and Systems

Artificial Intelligence in Knowledge-based Technologies and Systems Computer Science and Information Technology 4(1): 27-32, 2016 DOI: 10.13189/csit.2016.040105 http://www.hrpub.org Artificial Intelligence in Knowledge-based Technologies and Systems Viktor Krasnoproshin

More information

Mathematical Induction

Mathematical Induction Mathematical Induction In logic, we often want to prove that every member of an infinite set has some feature. E.g., we would like to show: N 1 : is a number 1 : has the feature Φ ( x)(n 1 x! 1 x) How

More information

Mathematical Induction

Mathematical Induction Mathematical Induction (Handout March 8, 01) The Principle of Mathematical Induction provides a means to prove infinitely many statements all at once The principle is logical rather than strictly mathematical,

More information

PRIME FACTORS OF CONSECUTIVE INTEGERS

PRIME FACTORS OF CONSECUTIVE INTEGERS PRIME FACTORS OF CONSECUTIVE INTEGERS MARK BAUER AND MICHAEL A. BENNETT Abstract. This note contains a new algorithm for computing a function f(k) introduced by Erdős to measure the minimal gap size in

More information

MATH10040 Chapter 2: Prime and relatively prime numbers

MATH10040 Chapter 2: Prime and relatively prime numbers MATH10040 Chapter 2: Prime and relatively prime numbers Recall the basic definition: 1. Prime numbers Definition 1.1. Recall that a positive integer is said to be prime if it has precisely two positive

More information

Math 4310 Handout - Quotient Vector Spaces

Math 4310 Handout - Quotient Vector Spaces Math 4310 Handout - Quotient Vector Spaces Dan Collins The textbook defines a subspace of a vector space in Chapter 4, but it avoids ever discussing the notion of a quotient space. This is understandable

More information

Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2

Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2 CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2 Proofs Intuitively, the concept of proof should already be familiar We all like to assert things, and few of us

More information

Row Echelon Form and Reduced Row Echelon Form

Row Echelon Form and Reduced Row Echelon Form These notes closely follow the presentation of the material given in David C Lay s textbook Linear Algebra and its Applications (3rd edition) These notes are intended primarily for in-class presentation

More information

APPLICATION SCHEMES OF POSSIBILITY THEORY-BASED DEFAULTS

APPLICATION SCHEMES OF POSSIBILITY THEORY-BASED DEFAULTS APPLICATION SCHEMES OF POSSIBILITY THEORY-BASED DEFAULTS Churn-Jung Liau Institute of Information Science, Academia Sinica, Taipei 115, Taiwan e-mail : liaucj@iis.sinica.edu.tw Abstract In this paper,

More information

Basic Probability Concepts

Basic Probability Concepts page 1 Chapter 1 Basic Probability Concepts 1.1 Sample and Event Spaces 1.1.1 Sample Space A probabilistic (or statistical) experiment has the following characteristics: (a) the set of all possible outcomes

More information

Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets

Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Nathaniel Hendren January, 2014 Abstract Both Akerlof (1970) and Rothschild and Stiglitz (1976) show that

More information

Determination of the normalization level of database schemas through equivalence classes of attributes

Determination of the normalization level of database schemas through equivalence classes of attributes Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,

More information

Chapter 3. Cartesian Products and Relations. 3.1 Cartesian Products

Chapter 3. Cartesian Products and Relations. 3.1 Cartesian Products Chapter 3 Cartesian Products and Relations The material in this chapter is the first real encounter with abstraction. Relations are very general thing they are a special type of subset. After introducing

More information

Problem of the Month: Perfect Pair

Problem of the Month: Perfect Pair Problem of the Month: The Problems of the Month (POM) are used in a variety of ways to promote problem solving and to foster the first standard of mathematical practice from the Common Core State Standards:

More information

Practical Guide to the Simplex Method of Linear Programming

Practical Guide to the Simplex Method of Linear Programming Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear

More information

1 if 1 x 0 1 if 0 x 1

1 if 1 x 0 1 if 0 x 1 Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or

More information

Iterated Dynamic Belief Revision. Sonja Smets, University of Groningen. website: http://www.vub.ac.be/clwf/ss

Iterated Dynamic Belief Revision. Sonja Smets, University of Groningen. website: http://www.vub.ac.be/clwf/ss LSE-Groningen Workshop I 1 Iterated Dynamic Belief Revision Sonja Smets, University of Groningen website: http://www.vub.ac.be/clwf/ss Joint work with Alexandru Baltag, COMLAB, Oxford University LSE-Groningen

More information

NP-Completeness and Cook s Theorem

NP-Completeness and Cook s Theorem NP-Completeness and Cook s Theorem Lecture notes for COM3412 Logic and Computation 15th January 2002 1 NP decision problems The decision problem D L for a formal language L Σ is the computational task:

More information

Chapter 7. Sealed-bid Auctions

Chapter 7. Sealed-bid Auctions Chapter 7 Sealed-bid Auctions An auction is a procedure used for selling and buying items by offering them up for bid. Auctions are often used to sell objects that have a variable price (for example oil)

More information

No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics

No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics No: 10 04 Bilkent University Monotonic Extension Farhad Husseinov Discussion Papers Department of Economics The Discussion Papers of the Department of Economics are intended to make the initial results

More information

Lecture 8 The Subjective Theory of Betting on Theories

Lecture 8 The Subjective Theory of Betting on Theories Lecture 8 The Subjective Theory of Betting on Theories Patrick Maher Philosophy 517 Spring 2007 Introduction The subjective theory of probability holds that the laws of probability are laws that rational

More information

Testing LTL Formula Translation into Büchi Automata

Testing LTL Formula Translation into Büchi Automata Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland

More information

Correspondence analysis for strong three-valued logic

Correspondence analysis for strong three-valued logic Correspondence analysis for strong three-valued logic A. Tamminga abstract. I apply Kooi and Tamminga s (2012) idea of correspondence analysis for many-valued logics to strong three-valued logic (K 3 ).

More information

ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2015

ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2015 ECON 459 Game Theory Lecture Notes Auctions Luca Anderlini Spring 2015 These notes have been used before. If you can still spot any errors or have any suggestions for improvement, please let me know. 1

More information

Extending Semantic Resolution via Automated Model Building: applications

Extending Semantic Resolution via Automated Model Building: applications Extending Semantic Resolution via Automated Model Building: applications Ricardo Caferra Nicolas Peltier LIFIA-IMAG L1F1A-IMAG 46, Avenue Felix Viallet 46, Avenue Felix Viallei 38031 Grenoble Cedex FRANCE

More information

arxiv:1112.0829v1 [math.pr] 5 Dec 2011

arxiv:1112.0829v1 [math.pr] 5 Dec 2011 How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman Thomas P. Hayes arxiv:1112.0829v1 [math.pr] 5 Dec 2011 Abstract Consider a gambling game in which we are allowed to repeatedly

More information

11 Ideals. 11.1 Revisiting Z

11 Ideals. 11.1 Revisiting Z 11 Ideals The presentation here is somewhat different than the text. In particular, the sections do not match up. We have seen issues with the failure of unique factorization already, e.g., Z[ 5] = O Q(

More information

Integer Operations. Overview. Grade 7 Mathematics, Quarter 1, Unit 1.1. Number of Instructional Days: 15 (1 day = 45 minutes) Essential Questions

Integer Operations. Overview. Grade 7 Mathematics, Quarter 1, Unit 1.1. Number of Instructional Days: 15 (1 day = 45 minutes) Essential Questions Grade 7 Mathematics, Quarter 1, Unit 1.1 Integer Operations Overview Number of Instructional Days: 15 (1 day = 45 minutes) Content to Be Learned Describe situations in which opposites combine to make zero.

More information

KNOWLEDGE FACTORING USING NORMALIZATION THEORY

KNOWLEDGE FACTORING USING NORMALIZATION THEORY KNOWLEDGE FACTORING USING NORMALIZATION THEORY J. VANTHIENEN M. SNOECK Katholieke Universiteit Leuven Department of Applied Economic Sciences Dekenstraat 2, 3000 Leuven (Belgium) tel. (+32) 16 28 58 09

More information

Solutions Q1, Q3, Q4.(a), Q5, Q6 to INTLOGS16 Test 1

Solutions Q1, Q3, Q4.(a), Q5, Q6 to INTLOGS16 Test 1 Solutions Q1, Q3, Q4.(a), Q5, Q6 to INTLOGS16 Test 1 Prof S Bringsjord 0317161200NY Contents I Problems 1 II Solutions 3 Solution to Q1 3 Solutions to Q3 4 Solutions to Q4.(a) (i) 4 Solution to Q4.(a)........................................

More information

Topic 4. 4.3 Dempster-Shafer Theory

Topic 4. 4.3 Dempster-Shafer Theory Topic 4 Representation and Reasoning with Uncertainty Contents 4.0 Representing Uncertainty 4.1 Probabilistic methods 4.2 Certainty Factors (CFs) 4.3 Dempster-Shafer theory 4.4 Fuzzy Logic Dempster-Shafer

More information

A Framework for the Semantics of Behavioral Contracts

A Framework for the Semantics of Behavioral Contracts A Framework for the Semantics of Behavioral Contracts Ashley McNeile Metamaxim Ltd, 48 Brunswick Gardens, London W8 4AN, UK ashley.mcneile@metamaxim.com Abstract. Contracts have proved a powerful concept

More information

A Few Basics of Probability

A Few Basics of Probability A Few Basics of Probability Philosophy 57 Spring, 2004 1 Introduction This handout distinguishes between inductive and deductive logic, and then introduces probability, a concept essential to the study

More information

Adaptive Online Gradient Descent

Adaptive Online Gradient Descent Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650

More information

This asserts two sets are equal iff they have the same elements, that is, a set is determined by its elements.

This asserts two sets are equal iff they have the same elements, that is, a set is determined by its elements. 3. Axioms of Set theory Before presenting the axioms of set theory, we first make a few basic comments about the relevant first order logic. We will give a somewhat more detailed discussion later, but

More information

1 Solving LPs: The Simplex Algorithm of George Dantzig

1 Solving LPs: The Simplex Algorithm of George Dantzig Solving LPs: The Simplex Algorithm of George Dantzig. Simplex Pivoting: Dictionary Format We illustrate a general solution procedure, called the simplex algorithm, by implementing it on a very simple example.

More information

Which Semantics for Neighbourhood Semantics?

Which Semantics for Neighbourhood Semantics? Which Semantics for Neighbourhood Semantics? Carlos Areces INRIA Nancy, Grand Est, France Diego Figueira INRIA, LSV, ENS Cachan, France Abstract In this article we discuss two alternative proposals for

More information

Prime Numbers and Irreducible Polynomials

Prime Numbers and Irreducible Polynomials Prime Numbers and Irreducible Polynomials M. Ram Murty The similarity between prime numbers and irreducible polynomials has been a dominant theme in the development of number theory and algebraic geometry.

More information

FIRST YEAR CALCULUS. Chapter 7 CONTINUITY. It is a parabola, and we can draw this parabola without lifting our pencil from the paper.

FIRST YEAR CALCULUS. Chapter 7 CONTINUITY. It is a parabola, and we can draw this parabola without lifting our pencil from the paper. FIRST YEAR CALCULUS WWLCHENW L c WWWL W L Chen, 1982, 2008. 2006. This chapter originates from material used by the author at Imperial College, University of London, between 1981 and 1990. It It is is

More information

a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.

a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2. Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given

More information

Equations, Inequalities & Partial Fractions

Equations, Inequalities & Partial Fractions Contents Equations, Inequalities & Partial Fractions.1 Solving Linear Equations 2.2 Solving Quadratic Equations 1. Solving Polynomial Equations 1.4 Solving Simultaneous Linear Equations 42.5 Solving Inequalities

More information

A Little Set Theory (Never Hurt Anybody)

A Little Set Theory (Never Hurt Anybody) A Little Set Theory (Never Hurt Anybody) Matthew Saltzman Department of Mathematical Sciences Clemson University Draft: August 21, 2013 1 Introduction The fundamental ideas of set theory and the algebra

More information

Binary Adders: Half Adders and Full Adders

Binary Adders: Half Adders and Full Adders Binary Adders: Half Adders and Full Adders In this set of slides, we present the two basic types of adders: 1. Half adders, and 2. Full adders. Each type of adder functions to add two binary bits. In order

More information

PROTRADER: An Expert System for Program Trading

PROTRADER: An Expert System for Program Trading Managerial Finance Volume 15 Number 5 1989 1 PROTRADER: An Expert System for Program Trading by K.C. Chen, Theodore Brix Professor of Finance, School of Business, California State University, Fresno, CA

More information

Chapter II. Controlling Cars on a Bridge

Chapter II. Controlling Cars on a Bridge Chapter II. Controlling Cars on a Bridge 1 Introduction The intent of this chapter is to introduce a complete example of a small system development. During this development, you will be made aware of the

More information

LOOKING FOR A GOOD TIME TO BET

LOOKING FOR A GOOD TIME TO BET LOOKING FOR A GOOD TIME TO BET LAURENT SERLET Abstract. Suppose that the cards of a well shuffled deck of cards are turned up one after another. At any time-but once only- you may bet that the next card

More information

Separation Properties for Locally Convex Cones

Separation Properties for Locally Convex Cones Journal of Convex Analysis Volume 9 (2002), No. 1, 301 307 Separation Properties for Locally Convex Cones Walter Roth Department of Mathematics, Universiti Brunei Darussalam, Gadong BE1410, Brunei Darussalam

More information

A Semantical Perspective on Verification of Knowledge

A Semantical Perspective on Verification of Knowledge A Semantical Perspective on Verification of Knowledge Paul Leemans, Jan Treur, Mark Willems Vrije Universiteit Amsterdam, Department of Artificial Intelligence De Boelelaan 1081a, 1081 HV Amsterdam The

More information

LEARNING OBJECTIVES FOR THIS CHAPTER

LEARNING OBJECTIVES FOR THIS CHAPTER CHAPTER 2 American mathematician Paul Halmos (1916 2006), who in 1942 published the first modern linear algebra book. The title of Halmos s book was the same as the title of this chapter. Finite-Dimensional

More information

1.7 Graphs of Functions

1.7 Graphs of Functions 64 Relations and Functions 1.7 Graphs of Functions In Section 1.4 we defined a function as a special type of relation; one in which each x-coordinate was matched with only one y-coordinate. We spent most

More information

Set theory as a foundation for mathematics

Set theory as a foundation for mathematics V I I I : Set theory as a foundation for mathematics This material is basically supplementary, and it was not covered in the course. In the first section we discuss the basic axioms of set theory and the

More information

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach Reusable Knowledge-based Components for Building Software Applications: A Knowledge Modelling Approach Martin Molina, Jose L. Sierra, Jose Cuena Department of Artificial Intelligence, Technical University

More information

A Propositional Dynamic Logic for CCS Programs

A Propositional Dynamic Logic for CCS Programs A Propositional Dynamic Logic for CCS Programs Mario R. F. Benevides and L. Menasché Schechter {mario,luis}@cos.ufrj.br Abstract This work presents a Propositional Dynamic Logic in which the programs are

More information

5 Numerical Differentiation

5 Numerical Differentiation D. Levy 5 Numerical Differentiation 5. Basic Concepts This chapter deals with numerical approximations of derivatives. The first questions that comes up to mind is: why do we need to approximate derivatives

More information

Vector and Matrix Norms

Vector and Matrix Norms Chapter 1 Vector and Matrix Norms 11 Vector Spaces Let F be a field (such as the real numbers, R, or complex numbers, C) with elements called scalars A Vector Space, V, over the field F is a non-empty

More information

How To Know If A Domain Is Unique In An Octempo (Euclidean) Or Not (Ecl)

How To Know If A Domain Is Unique In An Octempo (Euclidean) Or Not (Ecl) Subsets of Euclidean domains possessing a unique division algorithm Andrew D. Lewis 2009/03/16 Abstract Subsets of a Euclidean domain are characterised with the following objectives: (1) ensuring uniqueness

More information

In Proceedings of the Eleventh Conference on Biocybernetics and Biomedical Engineering, pages 842-846, Warsaw, Poland, December 2-4, 1999

In Proceedings of the Eleventh Conference on Biocybernetics and Biomedical Engineering, pages 842-846, Warsaw, Poland, December 2-4, 1999 In Proceedings of the Eleventh Conference on Biocybernetics and Biomedical Engineering, pages 842-846, Warsaw, Poland, December 2-4, 1999 A Bayesian Network Model for Diagnosis of Liver Disorders Agnieszka

More information

Grade Level Year Total Points Core Points % At Standard 9 2003 10 5 7 %

Grade Level Year Total Points Core Points % At Standard 9 2003 10 5 7 % Performance Assessment Task Number Towers Grade 9 The task challenges a student to demonstrate understanding of the concepts of algebraic properties and representations. A student must make sense of the

More information

FROM NUMERICAL EQUIVALENCE TO ALGEBRAIC EQUIVALENCE 1. Rolene Liebenberg, Marlene Sasman and Alwyn Olivier

FROM NUMERICAL EQUIVALENCE TO ALGEBRAIC EQUIVALENCE 1. Rolene Liebenberg, Marlene Sasman and Alwyn Olivier FROM NUMERICAL EQUIVALENCE TO ALGEBRAIC EQUIVALENCE 1 Rolene Liebenberg, Marlene Sasman and Alwyn Olivier Mathematics Learning and Teaching Initiative (MALATI) In this paper we describe Malati s approach

More information

Fairfield Public Schools

Fairfield Public Schools Mathematics Fairfield Public Schools AP Statistics AP Statistics BOE Approved 04/08/2014 1 AP STATISTICS Critical Areas of Focus AP Statistics is a rigorous course that offers advanced students an opportunity

More information

Stochastic Inventory Control

Stochastic Inventory Control Chapter 3 Stochastic Inventory Control 1 In this chapter, we consider in much greater details certain dynamic inventory control problems of the type already encountered in section 1.3. In addition to the

More information

Least-Squares Intersection of Lines

Least-Squares Intersection of Lines Least-Squares Intersection of Lines Johannes Traa - UIUC 2013 This write-up derives the least-squares solution for the intersection of lines. In the general case, a set of lines will not intersect at a

More information

Describing, manipulating and pricing financial contracts: The MLFi language

Describing, manipulating and pricing financial contracts: The MLFi language Describing, manipulating and pricing financial contracts: The MLFi language Centre for Financial Research, Judge Institute of Management Cambridge, 14 March 2003 (revised January 2005) Jean-Marc Eber LexiFi,

More information

Unified Lecture # 4 Vectors

Unified Lecture # 4 Vectors Fall 2005 Unified Lecture # 4 Vectors These notes were written by J. Peraire as a review of vectors for Dynamics 16.07. They have been adapted for Unified Engineering by R. Radovitzky. References [1] Feynmann,

More information

CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e.

CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e. CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e. This chapter contains the beginnings of the most important, and probably the most subtle, notion in mathematical analysis, i.e.,

More information

Sudoku puzzles and how to solve them

Sudoku puzzles and how to solve them Sudoku puzzles and how to solve them Andries E. Brouwer 2006-05-31 1 Sudoku Figure 1: Two puzzles the second one is difficult A Sudoku puzzle (of classical type ) consists of a 9-by-9 matrix partitioned

More information

Formal Languages and Automata Theory - Regular Expressions and Finite Automata -

Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March

More information

Point and Interval Estimates

Point and Interval Estimates Point and Interval Estimates Suppose we want to estimate a parameter, such as p or µ, based on a finite sample of data. There are two main methods: 1. Point estimate: Summarize the sample by a single number

More information

Mathematics for Computer Science/Software Engineering. Notes for the course MSM1F3 Dr. R. A. Wilson

Mathematics for Computer Science/Software Engineering. Notes for the course MSM1F3 Dr. R. A. Wilson Mathematics for Computer Science/Software Engineering Notes for the course MSM1F3 Dr. R. A. Wilson October 1996 Chapter 1 Logic Lecture no. 1. We introduce the concept of a proposition, which is a statement

More information

Special Situations in the Simplex Algorithm

Special Situations in the Simplex Algorithm Special Situations in the Simplex Algorithm Degeneracy Consider the linear program: Maximize 2x 1 +x 2 Subject to: 4x 1 +3x 2 12 (1) 4x 1 +x 2 8 (2) 4x 1 +2x 2 8 (3) x 1, x 2 0. We will first apply the

More information

Fuzzy Probability Distributions in Bayesian Analysis

Fuzzy Probability Distributions in Bayesian Analysis Fuzzy Probability Distributions in Bayesian Analysis Reinhard Viertl and Owat Sunanta Department of Statistics and Probability Theory Vienna University of Technology, Vienna, Austria Corresponding author:

More information

Sensitivity Analysis 3.1 AN EXAMPLE FOR ANALYSIS

Sensitivity Analysis 3.1 AN EXAMPLE FOR ANALYSIS Sensitivity Analysis 3 We have already been introduced to sensitivity analysis in Chapter via the geometry of a simple example. We saw that the values of the decision variables and those of the slack and

More information

Credal Networks for Operational Risk Measurement and Management

Credal Networks for Operational Risk Measurement and Management Credal Networks for Operational Risk Measurement and Management Alessandro Antonucci, Alberto Piatti, and Marco Zaffalon Istituto Dalle Molle di Studi sull Intelligenza Artificiale Via Cantonale, Galleria

More information